CVE-2025-48255: CWE-352 Cross-Site Request Forgery (CSRF) in videowhisper Broadcast Live Video – Live Streaming : WebRTC, HLS, RTSP, RTMP
Cross-Site Request Forgery (CSRF) vulnerability in videowhisper Broadcast Live Video – Live Streaming : WebRTC, HLS, RTSP, RTMP allows Cross Site Request Forgery. This issue affects Broadcast Live Video – Live Streaming : WebRTC, HLS, RTSP, RTMP: from n/a through 6.2.4.
AI Analysis
Technical Summary
CVE-2025-48255 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the videowhisper Broadcast Live Video – Live Streaming product, which supports streaming protocols such as WebRTC, HLS, RTSP, and RTMP. This vulnerability affects versions up to 6.2.4. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged request to the vulnerable web application without their consent or knowledge. In this case, the vulnerability could allow an attacker to perform unauthorized actions on behalf of a logged-in user by exploiting the trust that the application places in the user's browser. The CVSS 3.1 base score of 4.3 (medium severity) reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The impact is limited to integrity (I:L) with no confidentiality or availability impact. The vulnerability does not require authentication, but the victim must be authenticated and interact with a malicious link or page to trigger the exploit. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-352, which is a common web security weakness related to CSRF attacks. Given the nature of the product, which is a live video broadcasting and streaming platform, exploitation could allow attackers to manipulate streaming sessions or settings, potentially disrupting service or causing unauthorized changes to broadcast configurations.
Potential Impact
For European organizations using the videowhisper Broadcast Live Video platform, this vulnerability could lead to unauthorized manipulation of live streaming sessions or broadcast settings if an attacker successfully tricks an authenticated user into executing malicious requests. While the confidentiality and availability impacts are minimal, the integrity of streaming content or configurations could be compromised, potentially damaging the organization's reputation or disrupting live events. This is particularly relevant for media companies, educational institutions, and enterprises relying on live streaming for communication or service delivery. The requirement for user interaction and an authenticated session limits the attack scope but does not eliminate risk, especially in environments where users may be targeted via phishing or malicious websites. Additionally, given the increasing reliance on live streaming technologies in Europe for business and entertainment, any disruption or unauthorized control could have operational and financial consequences.
Mitigation Recommendations
To mitigate this CSRF vulnerability effectively, European organizations should implement the following specific measures: 1) Apply any available patches or updates from videowhisper promptly once released. 2) Implement anti-CSRF tokens in all state-changing requests within the application to ensure that requests originate from legitimate users. 3) Enforce the SameSite cookie attribute (preferably 'Strict' or 'Lax') on session cookies to reduce the risk of CSRF attacks via cross-site requests. 4) Educate users about the risks of clicking on suspicious links or visiting untrusted websites while authenticated to the streaming platform. 5) Monitor and log unusual or unauthorized changes to streaming configurations or sessions to detect potential exploitation attempts. 6) Consider deploying Web Application Firewalls (WAFs) with rules to detect and block CSRF attack patterns targeting the streaming platform. 7) Review and restrict user privileges to the minimum necessary to reduce the impact of any successful CSRF attack. These steps go beyond generic advice by focusing on both technical controls and user awareness tailored to the specific product and threat.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-48255: CWE-352 Cross-Site Request Forgery (CSRF) in videowhisper Broadcast Live Video – Live Streaming : WebRTC, HLS, RTSP, RTMP
Description
Cross-Site Request Forgery (CSRF) vulnerability in videowhisper Broadcast Live Video – Live Streaming : WebRTC, HLS, RTSP, RTMP allows Cross Site Request Forgery. This issue affects Broadcast Live Video – Live Streaming : WebRTC, HLS, RTSP, RTMP: from n/a through 6.2.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-48255 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the videowhisper Broadcast Live Video – Live Streaming product, which supports streaming protocols such as WebRTC, HLS, RTSP, and RTMP. This vulnerability affects versions up to 6.2.4. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged request to the vulnerable web application without their consent or knowledge. In this case, the vulnerability could allow an attacker to perform unauthorized actions on behalf of a logged-in user by exploiting the trust that the application places in the user's browser. The CVSS 3.1 base score of 4.3 (medium severity) reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The impact is limited to integrity (I:L) with no confidentiality or availability impact. The vulnerability does not require authentication, but the victim must be authenticated and interact with a malicious link or page to trigger the exploit. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-352, which is a common web security weakness related to CSRF attacks. Given the nature of the product, which is a live video broadcasting and streaming platform, exploitation could allow attackers to manipulate streaming sessions or settings, potentially disrupting service or causing unauthorized changes to broadcast configurations.
Potential Impact
For European organizations using the videowhisper Broadcast Live Video platform, this vulnerability could lead to unauthorized manipulation of live streaming sessions or broadcast settings if an attacker successfully tricks an authenticated user into executing malicious requests. While the confidentiality and availability impacts are minimal, the integrity of streaming content or configurations could be compromised, potentially damaging the organization's reputation or disrupting live events. This is particularly relevant for media companies, educational institutions, and enterprises relying on live streaming for communication or service delivery. The requirement for user interaction and an authenticated session limits the attack scope but does not eliminate risk, especially in environments where users may be targeted via phishing or malicious websites. Additionally, given the increasing reliance on live streaming technologies in Europe for business and entertainment, any disruption or unauthorized control could have operational and financial consequences.
Mitigation Recommendations
To mitigate this CSRF vulnerability effectively, European organizations should implement the following specific measures: 1) Apply any available patches or updates from videowhisper promptly once released. 2) Implement anti-CSRF tokens in all state-changing requests within the application to ensure that requests originate from legitimate users. 3) Enforce the SameSite cookie attribute (preferably 'Strict' or 'Lax') on session cookies to reduce the risk of CSRF attacks via cross-site requests. 4) Educate users about the risks of clicking on suspicious links or visiting untrusted websites while authenticated to the streaming platform. 5) Monitor and log unusual or unauthorized changes to streaming configurations or sessions to detect potential exploitation attempts. 6) Consider deploying Web Application Firewalls (WAFs) with rules to detect and block CSRF attack patterns targeting the streaming platform. 7) Review and restrict user privileges to the minimum necessary to reduce the impact of any successful CSRF attack. These steps go beyond generic advice by focusing on both technical controls and user awareness tailored to the specific product and threat.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-19T14:13:09.841Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb63b
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 6:19:11 PM
Last updated: 11/22/2025, 6:01:47 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.